Mobility

Analysis of the Communication Between Colluding Applications on Modern Smartphones

Download Now Free registration required

Executive Summary

Modern Smartphones that implement permission-based security mechanisms suffer from attacks by colluding applications. Users are not made aware of possible implications of application collusion attacks - quite the contrary - on existing platforms, users are implicitly led to believe that by approving the installation of each application independently, they can limit the damage that an application can cause. The authors implement and analyze a number of covert and overt communication channels that enable applications to collude and therefore indirectly escalate their permissions.

  • Format: PDF
  • Size: 265.06 KB